name |
Voltage SecureMail Suite 2.0 |
EP-COS v3.0 Plain EPCOSV30d |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
NL |
status |
archived |
archived |
not_valid_after |
07.09.2012 |
17.03.2022 |
not_valid_before |
29.05.2007 |
17.03.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Get%20cert%20CC-17-127667.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-127667-CR2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST%20Lite-PLAIN]%20408317_ST_Lite_EP-COS_PLAIN_V3_0_rev1_7.pdf |
manufacturer |
Voltage Security |
NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity |
manufacturer_web |
https://www.voltage.com/ |
https://www.nxp.com |
security_level |
EAL2 |
EAL4+, ATE_DPT.2, ALC_DVS.2 |
dgst |
71199d48be16022d |
7d1b32c310802e20 |
heuristics/cert_id |
CCEVS-VR-0029-2007 |
NSCIB-CC-127667-CR2 |
heuristics/cert_lab |
US |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
ALC_DVS.2, AVA_VAN.3, ASE_ECD.1, ATE_DPT.2 |
heuristics/extracted_versions |
2.0 |
3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0955-2016 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0955-2016 |
heuristics/scheme_data |
- category: Secure Messaging
- certification_date: 29.05.2007
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date:
- id: CCEVS-VR-VID10129
- product: Voltage SecureMail Suite 2.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10129
- vendor: Voltage Security
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
60455fc9564e2545 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
|
Get cert CC-17-127667.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- CC-17-127667: 1
- NSCIB-CC-127667: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20170410121259+01'00'
- /Creator: BHC364e
- /ModDate: D:20170410121259+01'00'
- /Producer: KONICA MINOLTA bizhub C364e
- /Title: BHC364e-20170410121259
- pdf_file_size_bytes: 245157
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10129-vr.pdf |
[CR] NSCIB-CC-127667-CR2.pdf |
pdf_data/report_frontpage |
- NL:
- US:
- cert_id: CCEVS-VR-07-0029
- cert_item: ® TM Voltage Security, Inc. Palo Alto, CA Voltage SecureMail Suite 2.0
- cert_lab: US NIAP
|
- NL:
- cert_id:
- cert_item: EP-COS V3.0 Plain, EPCOSV30d
- cert_lab: Brightsight
- developer: NXP Semiconductors GmbH, Business Unit
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0955: 2
- BSI-DSZ-CC-0955-2016: 1
- NL:
- NSCIB-CC-127667: 1
- NSCIB-CC-127667-CR2: 11
- NSCIB-CC-15-66030: 1
- NSCIB-CC-15-66030-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL2: 1
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.4: 1
- FCS_COP: 5
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.AUDIT_BACKUP: 1
- A.EXTSRVPROT: 1
- A.LOCATE: 1
- A.LOWEXP: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SECURE_COMMS: 1
- A.USERDOCS: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20070606103547-07'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /ModDate: D:20070606145721-04'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070606173502
- /Title: D
- /_AdHocReviewCycleID: 301627650
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Rose Ignacio
- /_EmailSubject: Voltage VID 10129 Validation Report
- pdf_file_size_bytes: 223595
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: p646
- /CreationDate: D:20170602151409+02'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20170602151409+02'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report NSCIB-CC-127667-CR2
- pdf_file_size_bytes: 538634
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
pdf_data/st_filename |
st_vid10129-st.pdf |
[ST Lite-PLAIN] 408317_ST_Lite_EP-COS_PLAIN_V3_0_rev1_7.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- NL:
- NSCIB-CC-15-127667: 2
- NSCIB-CC-15-66030: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 10
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035-2007: 2
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 6
- EAL4 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 10
- ADO_IGS: 1
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 15
- ADV_RCR.1: 8
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_USR: 1
- AGD_USR.1: 13
- ATE:
- ATE_COV.1: 8
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_SOF.1: 11
- AVA_VLA.1: 12
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN_EXP: 30
- FAU_GEN_EXP.1: 4
- FAU_GEN_EXP.2: 9
- FAU_GEN_EXP.2.1: 1
- FAU_SAR_EXP: 26
- FAU_SAR_EXP.1: 6
- FAU_SAR_EXP.3: 9
- FAU_SAR_EXP.3.1: 1
- FCO:
- FCO_NRO_EXP.1: 9
- FCO_NRO_EXP.1.1: 1
- FCO_NRO_EXP.1.2: 1
- FCO_NRO_EXP.1.3: 1
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 17
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 33
- FCS_CKM_EXP.1: 4
- FCS_COP: 17
- FCS_COP.1: 25
- FCS_COP_EXP.1: 10
- FCS_COP_EXP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_SAR_EXP: 1
- FIA:
- FIA_UAU_EXP: 53
- FIA_UAU_EXP.2: 5
- FIA_UID: 5
- FIA_UID_EXP: 68
- FIA_UID_EXP.2: 5
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 37
- FMT_MSA.2.1: 1
- FMT_MTD_EXP: 19
- FMT_MTD_EXP.1: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.2: 1
- FMT_SMR_EXP: 21
- FMT_SMR_EXP.1: 9
- FPT:
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_RVM.1: 1
- FPT_RVM_EXP: 17
- FPT_RVM_EXP.1: 2
- FPT_SEP.1: 1
- FPT_SEP_EXP: 17
- FPT_SEP_EXP.1: 4
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FTP:
|
- FAU:
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 23
- FCS_CKM.2: 2
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 30
- FCS_COP.1: 11
- FCS_RND.1: 8
- FCS_RND.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_RIP.1: 1
- FDP_SOP.1: 2
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 12
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 13
- FMT_MTD.1: 5
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 1
- FPT_EMS.1: 8
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 4
- A.AUDIT: 2
- A.AUDIT_BACKUP: 2
- A.EXTSRVPROT: 4
- A.LOCATE: 2
- A.LOWEXP: 2
- A.NO_EVIL: 2
- A.PHYSICAL: 4
- A.SECURE_COMMS: 2
- A.USERDOCS: 4
- O:
- O.ACCESS: 8
- O.ACCOUN: 4
- O.ALGS: 6
- O.AUDREC: 4
- O.DESTROY: 6
- O.GUIDAN: 6
- O.IDENTITY: 6
- O.KEYGEN: 4
- O.MANAGE: 8
- O.MEDIAT: 4
- O.PART_SEL_PRO: 6
- O.PROOF: 4
- O.SECUREKEYS: 6
- O.SECURE_COM: 5
- OE:
- OE.ACCOUN: 5
- OE.ADMTRA: 9
- OE.DOMAIN_SEP: 5
- OE.GENPUR: 5
- OE.MANAGE: 9
- OE.MEDIAT: 5
- OE.NOEVIL: 8
- OE.NO_BYPASS: 5
- OE.PHYSEC: 10
- OE.TIME: 6
- T:
- T.AUDACC: 4
- T.BYPASS: 2
- T.COMPROMISE: 2
- T.MISUSE: 4
- T.NOAUTH: 4
- T.SPOOF: 2
- T.USAGE: 4
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 24
- NXP Semiconductors N.V: 43
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 2
- Physical Tampering: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- physical probing: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 7
- EF.DG1: 9
- EF.DG11: 1
- EF.DG13: 1
- EF.DG14: 2
- EF.DG16: 6
- EF.DG2: 4
- EF.DG3: 1
- EF.DG5: 1
- EF.DG6: 2
- EF.SOD: 7
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 12
- FIPS 180-2: 1
- FIPS 186-2: 9
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- PKCS:
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 180-412: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 9796-2: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Alternative descriptive title:
- /Author: NXP Semiconductors Germany GmbH
- /Cert_ID: NSCIB-CC-15-127667
- /Comments: Word 2007
- /Company: NXP Semiconductors Germany GmbH
- /Copyright date: 2016
- /CreationDate: D:20170316160659+01'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Descriptive title: NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
- /Division: NXP Semiconductors
- /Document identifier: 408317
- /Keywords: ASE, EP-COS, Common Criteria, EAL4 augmented, Security Target Lite
- /ModDate: D:20170316160845+01'00'
- /Modification date: 27 February 2017
- /Producer: Adobe PDF Library 11.0
- /Product name: Security Target Lite EP-COS V3.0 Plain
- /Product name title: Security Target Lite EP-COS V3.0 Plain
- /Revision: Rev. 1.7
- /Security status: COMPANY CONFIDENTIAL
- /SourceModified: D:20170316150354
- /Specification status:
- /Subject: EP-COS V3.0 Plain
- /Template date: 25 November 2014
- /Template version: 2.10.0A
- /Title: 408317_ST_Lite_EP-COS_PLAIN_V1_7
- pdf_file_size_bytes: 371551
- pdf_hyperlinks: http://www.nxp.com/
- pdf_is_encrypted: True
- pdf_number_of_pages: 43
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |